| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| UST / WETH | sushiswap | 0x8b00...fb7b | 0.00632293248877007 |
| MIR / UST | uniswap_v2 | 0x87da...4c88 | 0.00615381450040917 |
| UST / WETH 1% | uniswap_v3 | 0x3cf3...b4f8 | 0.00624616137279971 |
| 3Crv / UST | curve | 0x890f...985f | 0.00615140962579384 |
| USDC / UST 1% | uniswap_v3 | 0x59d8...1480 | 0.00628142727927733 |
| MIM / UST | curve | 0x55a8...1e18 | 0.00634112215219923 |
| UST / USDT | uniswap_v2 | 0xc50e...0c38 | 0.00634891607516233 |
| mUSO / UST | uniswap_v2 | 0x6bd8...008c | 0.00725105912 |
| UST / WETH 0.01% | sushiswap-v3-ethereum | 0x102a...5a76 | 0.03324902027 |
| mNFLX / UST | uniswap_v2 | 0xc99a...4f75 | 0.02000534349 |
| mIAU / UST | uniswap_v2 | 0xd7f9...4868 | 0.0266347467564545 |
| mTWTR / UST | uniswap_v2 | 0x3485...8040 | 0.01209524231 |
| mSLV / UST | uniswap_v2 | 0x8604...4fae | 0.01208960728 |
| mAMZN / UST | uniswap_v2 | 0x0ae8...e796 | 0.01139316628 |
| mQQQ / UST | uniswap_v2 | 0x9e3b...0a6c | 0.01209491084 |
| UST / WETH | uniswap_v2 | 0xc628...d8a9 | 0.00654107044411138 |
| UST / USDT 0.05% | uniswap_v3 | 0x868b...c2d2 | 0.0795056559389979 |
| mTSLA / UST | uniswap_v2 | 0x5233...a50c | 0.006558416891 |
| mAAPL / UST | uniswap_v2 | 0xb022...953b | 0.01201647963 |
| UST / USDT 1% | uniswap-v4-ethereum | 0xf811...aa48 | 0.006489547086 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.